Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 6 Jul 2010 15:51:57 +0200
From: Sebastian Krahmer <krahmer@...e.de>
To: oss-security@...ts.openwall.com
Cc: yoshfuji@...ux-ipv6.org
Subject: patch for remote buffer overflows and local message spoofing in mipv6 daemon

Hi,

I tried this 2 years ago on vendor-sec and with the maintainers
at that time w/o success. I polished the patch to fit in the current commit.
The bugs were not fixed during the two years.
Can someone assign CVE(s)?

Sebastian


-- 
~
~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@...e.de - SuSE Security Team
~ SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)


View attachment "mipv6-daemon-0.5rc1.diff" of type "text/x-patch" (2918 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.